Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations.

In response to an unprecedented level of espionage and cyber attacks aimed at compromising critical government IT infrastructure-from networks to applications-the federal government last year announced new standards. Regulations have

Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.

In a twist, thieves in the U.K. hacked personal data to steal high-end smartphones, rather than hacking phones to steal personal data.

The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files, by successfully decrypting the files, or by restoring the files from backups,...

Service providers that run the backbone of the internet need to have a coordinated response to deal with a global distributed denial of service attack, security experts say. There's only so much that individual enterprises can do when...

Every week thousands of businesses are building apps, off-loading workloads and hosting core infrastructure with Microsoft Azure. Since 2014 Microsoft has boosted its cloud offerings with major improvements to security, compliance and

Government agencies, law enforcement, security experts, and businesses joined IBM Security as they opened the industry's first commercial Cyber Range at their new global headquarters in Cambridge, Mass., today.

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts are questioning the ethics and benefits of this approach.

The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure.

To find "low and slow" threats, security approaches must now deal in the world of "gray"-small signals that must be detected, put in context over time and added up to indicate pending harm.In this handy guide you will learn how the

The Online Trust Association issued a prescription earlier this year for securing IoT devices. But even the association’s director admits that, with billions of devices already in use, change will not come easily or quickly.

European Union privacy watchdogs have warned WhatsApp CEO Jan Koum to stop sharing users' data with parent company Facebook until they investigated whether the transfers comply with EU data protection law. They also want Yahoo's...

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor.

Niara's behavioral analytics platform amplifies the threat hunting skills of experienced security professionals, allowing them to quickly test out hypotheses and hunt for attacks within the organization, going back over extended time

A suspected Russian hacker arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says.

It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be able to do this effectively, you...